default search action
Gedare Bloom
Person information
- affiliation: University of Colorado Colorado Springs, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Paul Agbaje
, Habeeb Olufowobi
, Sena Hounsinou, Gedare Bloom
:
From Weeping to Wailing: A Transitive Stealthy Bus-Off Attack. IEEE Trans. Intell. Transp. Syst. 25(9): 12066-12080 (2024) - [c47]Constance Hendrix, Gedare Bloom:
Platoon Vulnerability due to Network Topology and Targeted Vehicle. CCNC 2024: 771-776 - [c46]Farhad Mofidi
, Sena Hounsinou, Gedare Bloom:
L-IDS: A Multi-Layered Approach to Ransomware Detection in IoT. CCWC 2024: 387-396 - [c45]Minhajul Alam Rahat
, Vijay Banerjee, Gedare Bloom, Yanyan Zhuang:
Cimalir: Cross-Platform IoT Malware Clustering using Intermediate Representation. CCWC 2024: 460-466 - [c44]Austen Knapp, Emmanuel Wamuo, Minhajul Alam Rahat
, Santiago Torres-Arias, Gedare Bloom, Yanyan Zhuang:
Should Smart Homes Be Afraid of Evil Maids? : Identifying Vulnerabilities in IoT Device Firmware. CCWC 2024: 467-473 - [c43]Omolade Ikumapayi, Paul Agbaje, Yanyan Zhuang, Habeeb Olufowobi, Gedare Bloom:
Deadline-Based Class Assignment for Time-Sensitive Network Frame Preemption. ICIT 2024: 1-8 - [i2]Melkamu Mersha, Tsion Abay, Mingziem Bitewa, Gedare Bloom:
Agile TLB Prefetching and Prediction Replacement Policy. CoRR abs/2412.17203 (2024) - 2023
- [j12]Omolade Ikumapayi
, Habeeb Olufowobi
, Jeremy Daily, Tingting Hu
, Ivan Cibrario Bertolotti, Gedare Bloom
:
CANASTA: Controller Area Network Authentication Schedulability Timing Analysis. IEEE Trans. Veh. Technol. 72(8): 10024-10036 (2023) - [c42]Joshua H. Seaton, Sena Hounsinou, Gedare Bloom, Philip N. Brown
:
Competitive Information Provision Among Internet Routing Nodes. ACC 2023: 1074-1079 - [c41]Farhad Mofidi
, Sena Hounsinou
, Gedare Bloom
:
L-IDS: A lightweight hardware-assisted IDS for IoT systems to detect ransomware attacks. IoTDI 2023: 464-465 - [c40]Omolade Ikumapayi, Habeeb Olufowobi
, Jeremy Daily, Tingting Hu, Ivan Cibrario Bertolotti, Gedare Bloom:
Work in Progress: Schedulability Analysis of CAN and CAN FD Authentication. RTAS 2023: 349-352 - [c39]Catherine Meadows
, Sena Hounsinou
, Timothy Wood
, Gedare Bloom
:
Sidecar-based Path-aware Security for Microservices. SACMAT 2023: 157-162 - 2022
- [j11]Uchenna Ezeobi, Habeeb Olufowobi
, Clinton Young
, Joseph Zambreno
, Gedare Bloom
:
Reverse Engineering Controller Area Network Messages Using Unsupervised Machine Learning. IEEE Consumer Electron. Mag. 11(1): 50-56 (2022) - [j10]Heather Lawrence, Uchenna Ezeobi
, Orly Tauil, Jacob Nosal, Owen Redwood, Yanyan Zhuang
, Gedare Bloom
:
CUPID: A labeled dataset with Pentesting for evaluation of network intrusion detection. J. Syst. Archit. 129: 102621 (2022) - [j9]Paul Agbaje
, Afia Anjum, Arkajyoti Mitra, Emmanuel Oseghale
, Gedare Bloom
, Habeeb Olufowobi
:
Survey of Interoperability Challenges in the Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 23(12): 22838-22861 (2022) - [c38]Heather Lawrence, Uchenna Ezeobi, Gedare Bloom, Yanyan Zhuang:
Shining New Light on Useful Features for Network Intrusion Detection Algorithms. CCNC 2022: 369-377 - [c37]Vijay Banerjee, Ryan Rabinowitz, Mark Stidd, Rory A. Lewis, Philip N. Brown, Gedare Bloom:
The Tragedy of the Miners. CCNC 2022: 760-765 - [c36]Vijay Banerjee, Sena Hounsinou, Habeeb Olufowobi
, Monowar Hasan
, Gedare Bloom:
Secure Reboots for Real-Time Cyber-Physical Systems. CPSIOTSEC@CCS 2022: 27-33 - [c35]Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Detecting and Classifying Self-Deleting Windows Malware Using Prefetch Files. CCWC 2022: 745-751 - [c34]Adam Duby, Teryl Taylor, Gedare Bloom, Yanyan Zhuang:
Evaluating Feature Robustness for Windows Malware Family Classification. ICCCN 2022: 1-10 - [c33]Joshua H. Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N. Brown, Gedare Bloom:
Poster: Toward Zero-Trust Path-Aware Access Control. SACMAT 2022: 267-269 - 2021
- [j8]James Marshall
, Robert Gifford, Gedare Bloom
, Gabriel Parmer, Rahul Simha:
Precise Cache Profiling for Studying Radiation Effects. ACM Trans. Embed. Comput. Syst. 20(3): 25:1-25:25 (2021) - [c32]Richi Dubey, Vijay Banerjee, Sena Hounsinou, Gedare Bloom:
Strong APA scheduling in a real-time operating system: work-in-progress. EMSOFT 2021: 47-48 - [c31]Sena Hounsinou, Mark Stidd, Uchenna Ezeobi, Habeeb Olufowobi
, Mitra Nasri
, Gedare Bloom:
Vulnerability of Controller Area Network to Schedule-Based Attacks. RTSS 2021: 495-507 - [c30]Sena Hounsinou, Vijay Banerjee, Chunhao Peng, Monowar Hasan, Gedare Bloom:
Work-in-Progress: Enabling Secure Boot for Real-Time Restart-Based Cyber-Physical Systems. RTSS 2021: 524-527 - 2020
- [j7]Habeeb Olufowobi
, Clinton Young
, Joseph Zambreno
, Gedare Bloom
:
SAIDuCANT: Specification-Based Automotive Intrusion Detection Using Controller Area Network (CAN) Timing. IEEE Trans. Veh. Technol. 69(2): 1484-1494 (2020) - [c29]Gedare Bloom, Joel Sherrill:
Harmonizing ARINC 653 and Realtime POSIX for Conformance to the FACE Technical Standard. ISORC 2020: 98-105 - [c28]Prajjwal Dangal, Gedare Bloom:
Towards Industrial Security Through Real-time Analytics. ISORC 2020: 156-157 - [i1]Jason Lowe-Power, Abdul Mutaal Ahmad, Ayaz Akram, Mohammad Alian
, Rico Amslinger, Matteo Andreozzi, Adrià Armejach, Nils Asmussen, Srikant Bharadwaj, Gabe Black, Gedare Bloom, Bobby R. Bruce
, Daniel Rodrigues Carvalho, Jerónimo Castrillón, Lizhong Chen, Nicolas Derumigny, Stephan Diestelhorst, Wendy Elsasser, Marjan Fariborz, Amin Farmahini Farahani, Pouya Fotouhi, Ryan Gambord, Jayneel Gandhi
, Dibakar Gope, Thomas Grass, Bagus Hanindhito, Andreas Hansson, Swapnil Haria, Austin Harris, Timothy Hayes, Adrian Herrera, Matthew Horsnell, Syed Ali Raza Jafri, Radhika Jagtap, Hanhwi Jang, Reiley Jeyapaul, Timothy M. Jones, Matthias Jung, Subash Kannoth, Hamidreza Khaleghzadeh
, Yuetsu Kodama, Tushar Krishna, Tommaso Marinelli, Christian Menard
, Andrea Mondelli, Tiago Mück, Omar Naji, Krishnendra Nathella, Hoa Nguyen
, Nikos Nikoleris, Lena E. Olson, Marc S. Orr, Binh Pham, Pablo Prieto, Trivikram Reddy, Alec Roelke, Mahyar Samani, Andreas Sandberg
, Javier Setoain, Boris Shingarov, Matthew D. Sinclair, Tuan Ta, Rahul Thakur, Giacomo Travaglini, Michael Upton, Nilay Vaish, Ilias Vougioukas, Zhengrong Wang, Norbert Wehn, Christian Weis, David A. Wood, Hongil Yoon, Éder F. Zulian:
The gem5 Simulator: Version 20.0+. CoRR abs/2007.03152 (2020)
2010 – 2019
- 2019
- [j6]Clinton Young
, Joseph Zambreno
, Habeeb Olufowobi
, Gedare Bloom
:
Survey of Automotive Controller Area Network Intrusion Detection Systems. IEEE Des. Test 36(6): 48-55 (2019) - [j5]Udit Kumar Agarwal, Vara Punit Ashokbhai, Gedare Bloom, Christian Mauderer, Joel Sherrill:
Comparison of file systems in RTEMS. SIGBED Rev. 16(3): 39-44 (2019) - [j4]Gedare Bloom
, Gianluca Cena
, Ivan Cibrario Bertolotti
, Tingting Hu
, Nicolas Navet
, Adriano Valenzano
:
Event Notification in CAN-Based Sensor Networks. IEEE Trans. Ind. Informatics 15(10): 5613-5625 (2019) - [c27]Habeeb Olufowobi
, Sena Hounsinou, Gedare Bloom:
Controller Area Network Intrusion Prevention System Leveraging Fault Recovery. CPS-SPC@CCS 2019: 63-73 - [c26]Clinton Young, Habeeb Olufowobi
, Gedare Bloom, Joseph Zambreno:
Automotive Intrusion Detection Based on Constant CAN Message Frequencies Across Vehicle Driving Modes. AutoSec@CODASPY 2019: 9-14 - [c25]Habeeb Olufowobi
, Uchenna Ezeobi, Eric Muhati, Gaylon Robinson, Clinton Young, Joseph Zambreno, Gedare Bloom:
Anomaly Detection Approach Using Adaptive Cumulative Sum Algorithm for Controller Area Network. AutoSec@CODASPY 2019: 25-30 - [c24]Mitra Nasri
, Thidapat Chantem, Gedare Bloom, Ryan M. Gerdes:
On the Pitfalls and Vulnerabilities of Schedule Randomization Against Schedule-Based Attacks. RTAS 2019: 103-116 - 2018
- [j3]Gedare Bloom, Joel Sherrill, Gary Gilliland:
Aligning Deos and RTEMS with the FACE safety base operating system profile. SIGBED Rev. 15(1): 15-21 (2018) - [c23]Sibin Mohan
, Mikael Asplund, Gedare Bloom, Ahmad-Reza Sadeghi, Ahmad Ibrahim, Negin Salajageh, Paul Griffioen
, Bruno Sinopoli:
The future of IoT security: special session. EMSOFT 2018: 16:1-16:7 - [c22]Habeeb Olufowobi
, Gedare Bloom, Clinton Young, Joseph Zambreno:
Work-in-Progress: Real-Time Modeling for Intrusion Detection in Automotive Controller Area Network. RTSS 2018: 161-164 - [c21]Gedare Bloom, Bassma Alsulami, Ebelechukwu Nwafor, Ivan Cibrario Bertolotti:
Design patterns for the industrial Internet of Things. WFCS 2018: 1-10 - 2017
- [c20]Gedare Bloom, Gianluca Cena, Ivan Cibrario Bertolotti, Tingting Hu, Adriano Valenzano:
Supporting security protocols on CAN-based networks. ICIT 2017: 1334-1339 - [c19]Corey Tessler, Gedare Bloom, Nathan Fisher:
Work-in-Progress: Reducing Cache Conflicts via Interrupts and BUNDLE Scheduling. RTAS 2017: 125-128 - [c18]Ebelechukwu Nwafor, Andre Campbell, David Hill, Gedare Bloom:
Towards a provenance collection framework for Internet of Things devices. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-6 - [c17]Gedare Bloom, Gianluca Cena, Ivan Cibrario Bertolotti, Tingting Hu, Adriano Valenzano:
Optimized event notification in CAN through in-frame replies and Bloom filters. WFCS 2017: 1-10 - 2016
- [c16]Jiguo Song, Gedare Bloom, Gabriel Parmer:
SuperGlue: IDL-Based, System-Level Fault Tolerance for Embedded Systems. DSN 2016: 227-238 - [c15]Gedare Bloom, Gabriel Parmer, Rahul Simha:
LockDown: an operating system for achieving service continuity by quarantining principals. EUROSEC 2016: 7:1-7:6 - [c14]Gedare Bloom, Joel Sherrill, Gary Gilliland:
Aligning Deos and RTEMS with the FACE Safety Base Operating System Profile. EWiLi 2016 - [c13]James Marshall, Gedare Bloom, Gabriel Parmer, Rahul Simha:
n-Modular Redundant Real-Time Middleware: Design and Implementation. EWiLi 2016 - [c12]Saurabh Gadia, Cyrille Artho, Gedare Bloom:
Verifying Nested Lock Priority Inheritance in RTEMS with Java Pathfinder. ICFEM 2016: 417-432 - [c11]Yuxin Ren, Gabriel Parmer, Teo Georgiev, Gedare Bloom:
CBufs: efficient, system-wide memory management and sharing. ISMM 2016: 68-77 - 2015
- [c10]Gedare Bloom, Bhagirath Narahari, Rahul Simha, Ali Namazi, Renato Levy:
FPGA SoC architecture and runtime to prevent hardware Trojans from leaking secrets. HOST 2015: 48-51 - 2014
- [j2]Gedare Bloom, Joel Sherrill:
Scheduling and thread management with RTEMS. SIGBED Rev. 11(1): 20-25 (2014) - [c9]Gedare Bloom, Rahul Simha:
Hardware-enhanced distributed access enforcement for role-based access control. SACMAT 2014: 5-16 - 2013
- [c8]Eugen Leontie, Gedare Bloom, Rahul Simha:
Hardware and software support for fine-grained memory access control and encapsulation in C++. SPLASH (Companion Volume) 2013: 81-82 - [c7]Scotty Smith, Gedare Bloom, Rahul Simha:
PyLOM: a language and run-time system for planning applications. SPLASH (Companion Volume) 2013: 91-92 - 2012
- [c6]Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha:
No Principal Too Small: Memory Access Control for Fine-Grained Protection Domains. DSD 2012: 163-170 - [c5]Gedare Bloom, Gabriel Parmer, Bhagirath Narahari, Rahul Simha:
Shared hardware data structures for hard real-time systems. EMSOFT 2012: 133-142 - 2011
- [c4]Eugen Leontie, Gedare Bloom, Rahul Simha:
Automation for Creating and Configuring Security Manifests for Hardware Containers. SafeConfig 2011
2000 – 2009
- 2009
- [j1]Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Providing secure execution environments with a last line of defense against Trojan circuit attacks. Comput. Secur. 28(7): 660-669 (2009) - [c3]Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Hardware-enforced fine-grained isolation of untrusted code. SecuCode@CCS 2009: 11-18 - [c2]Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems. CSE (2) 2009: 830-836 - [c1]Gedare Bloom, Bhagirath Narahari, Rahul Simha:
OS Support for Detecting Trojan Circuit Attacks. HOST 2009: 100-103
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-27 00:45 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint